Welcome to the "Seven Deadliest Unified Communications Attacks" site

It is 2015 and your communications system is no longer some box screwed onto plywood in some back room with a bunch of phones connected to it. Today your "Unified Communications" system is voice, video, instant messaging, presence, collaboration... and so much more... all running on commodity operating systems and running across your data network and even potentially the public Internet.

Please do explore this site, watch the video below and head on over to your favorite bookseller (such as Amazon) to pick up your copy of the Seven Deadliest Unified Communications Attacks. Make sure your UC systems are as secure as possible today!

It is 2015 and your communications system is no longer some box screwed onto plywood in some back room with a bunch of phones connected to it. Today your "Unified Communications" system is voice, video, instant messaging, presence, collaboration... and so much more... all running on commodity operating systems and running across your data network and even potentially the public Internet.

Please do explore this site, watch the video below and head on over to your favorite bookseller (such as Amazon) to pick up your copy of the Seven Deadliest Unified Communications Attacks. Make sure your UC systems are as secure as possible today!